Exam 12: Information Systems Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is used for biometric authentication?

(Multiple Choice)
4.9/5
(43)

What are the three general sources of security threats?

(Essay)
4.8/5
(36)

A ________ examines each part of a message and determines whether to let that part pass.

(Multiple Choice)
4.8/5
(37)

Which of the following statements is true of the Secure Socket Layer (SSL)?

(Multiple Choice)
4.8/5
(37)

________ protect databases and other organizational data.

(Multiple Choice)
4.9/5
(34)

A Trojan horse is a virus that masquerades as a useful program or file.

(True/False)
4.8/5
(33)

Faulty service excludes problems that result due to incorrect data modification.

(True/False)
4.9/5
(42)

________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

(Multiple Choice)
4.8/5
(30)

________ is similar to spyware but it watches user activity and produces pop-ups.

(Multiple Choice)
4.7/5
(32)

________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.

(Multiple Choice)
4.8/5
(34)

Which of the following is a critical security function that the senior management should address in an organization?

(Multiple Choice)
4.8/5
(36)

Discuss some human safeguards for employees that can ensure the security of information systems.

(Essay)
4.9/5
(33)

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

(Multiple Choice)
4.9/5
(39)

SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.

(True/False)
4.9/5
(37)

Which of the following systems procedures is specifically the responsibility of operations personnel?

(Multiple Choice)
5.0/5
(30)

It is easy and economical to hold public users of Web sites accountable for security violations.

(True/False)
4.8/5
(40)

Cookies enable an individual to access Web sites without having to sign in every time.

(True/False)
4.9/5
(42)

Users of smart cards are required to enter a ________ to be authenticated.

(Multiple Choice)
4.7/5
(36)

The existence of accounts that are no longer in use are not a security threat to an organization.

(True/False)
4.8/5
(41)

________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

(Multiple Choice)
4.8/5
(32)
Showing 101 - 120 of 123
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)